Centralized collection, processing, analysis, and storage of data from sources, automatic identification of potential incidents, their confirmation, and notification to customer services.
Security event monitoring and incident analysis
Performing actions to localize the confirmed incident, reduce negative consequences, oust the attacker from the infrastructure, and restore normal operation.
Analyzing the consequences of hacking computer systems, collecting evidence of cybercrimes, building a chain of actions of intruders and checking for bookmarks left in the infrastructure.
Incident investigation (forensics)
Transmission of information about incidents in the client's infrastructure to the NCC by agreement or automatically. Interaction with the GosSOPKA center on behalf of the client.
GosSOPKA Commercial Center
Penetration testing (pentest)
Identification of vulnerabilities and ways to exploit them. Checking the possibility of penetration from external networks into the customer's infrastructure. Development of recommendations to increase the level of security and eliminate identified vulnerabilities.
Search for traces of intruders and malicious software in the client's infrastructure - collecting information and settings from assets on the network, detailed manual and machine data analysis, and generating an exhaustive report. Full-cycle Compromise Assessment.
Search for traces of compromise